Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How scammers swindle ...

 Business

The first few days in a new workplace are commonly packed with team meetings, trainings, onboarding sessions, and so on. Much ado with little understanding of whats going on. At the same time there are certain rituals that many new hires go in for these days — one of which being posting on social media (most   show more ...

commonly, but not exclusively, on LinkedIn) about starting a new job. Often, companies themselves announce there how happy they are to welcome a new team member. And thats when the freshly minted employee attracts the attention of scammers. As a rule, such social-media posts give the names of both the employee and the company, as well as the job title. This is usually enough to identify the new persons manager (through the same social network or the corporate website). Knowing the names, you can either find or figure out their e-mail addresses. Firstly, there are lots of e-mail lookup tools to help with this. Secondly, many companies simply use the employees first name, or first and last names, as their e-mail usernames, so all thats needed is to check which system is in use to be able to work out the address. And once theyve got your e-mail, then its time for some social engineering. Task one: transfer money to scammers For the first few days in a new job the employee is likely not quite up to speed, yet keen to appear so in the eyes of colleagues and superiors. And this can lower the new employees vigilance: they hastily carry out most any task without stopping to think where it came from, whether it sounds reasonable, or whether its their business at all. Someone wants it done, so done it must be. This is especially true if the instruction came from their immediate supervisor or even one of the company founders. Scammers exploit this to trick new employees. They send an e-mail supposedly from the boss or someone senior (but using a non-company address) asking the employee to do a task right away. The newbie, of course, is happy to oblige. The task might be, say, to transfer funds to a contractor or purchase gift certificates of a certain value. And the message makes clear that speed is of the essence and youll be paid back by the end of the day (of course!). Scammers highlight the urgency so as not to give the employee time to think or check with someone else. The boss has an air of authority, and the employee wants to be of use. So, they dont stop to query the rationale, or why they in particular have been chosen to perform the task. The victim transfers the money to the specified account without hesitation and reports back to the boss at the same e-mail address — again failing to spot that the domain name looks suspicious. The scammer continues to play the role of the big boss: they ask for documents confirming the transaction, and, after receiving them, praise the employee and say that theyll forward the documents to the initiator of the order (which adds a sense of legitimacy). To complete the feeling of a normal workplace interaction, the attackers also say theyll be in touch again if anything more is needed from the (hapless) employee. Only after some time does the employee either start to wonder why they were assigned the task, spot the non-company e-mail address, or mention the incident in conversation with the real boss. Then the sad truth dawns: it was a scam. Aggravating circumstances Like other work-related scams, this scheme has benefited from the mass shift to remote working. Even small companies have started hiring from around the world, meaning that some new employees may not only not know what their boss looks and sounds like — but have no way of quickly clarifying with a co-worker, even if they wanted to, whether the task looks to be on the level. Whats more, if the supervisor and most of the other employees work in different countries, a request to transfer money to someone in your region could feel very plausible. Domestic bank transfers are always easier and faster than international ones, which lends a veil of normalcy to the scam request. Finally, smaller companies, which seem to be common targets, tend to have less formal money-handling procedures in place — without form-filling or financial controllers: just send it now, put it on your expenses, and youll get it back in a bit. This is another factor that imparts legitimacy to scam e-mails. How employees can avoid the trap The most important thing for a new employee is not to lose their head trying to be of service to the company. Its important to look carefully at the addresses from which messages arrive by e-mail or in a messenger. If it looks unfamiliar, redouble your vigilance. Dont hesitate to ask a colleague whether such a request is normal practice. If something appears odd, better ask now than regret it later. If you get an unusual request seemingly from inside the company, clarify the details with the sender using a different communication channel. Been asked to buy gift certificates by the boss in an e-mail? Check with them in a messenger. How companies can protect their employees The most important thing an employer can do is correctly configure the companys mail server. It can be set up to flag e-mails from non-corporate addresses. For example, Google Workspace, popular with companies, labels such messages as External by default. And when you try to reply to such an e-mail, it clearly warns: Be careful about sharing sensitive information. Such notifications really help employees know whether theyre talking to a company colleague or not. In addition, we recommend the following: To hold information-security training for employees on their very first day. The session should introduce the concept of phishing (just in case its new), as well as give instructions on which practices are in use at the company and which definitely are not. To create an information-security guide for new employees with basic rules and precautions against major threats. See our post for details of what to include. To hold regular security awareness trainings for all employees; for example, using a specialized online platform.

 Expert Blogs and Opinion

Cyberattacks and fraud are now too closely linked to be considered separately. But many firms still have investigative fraud teams and cybersecurity teams operating independently, along with the systems and processes that support them.

 Threat Actors

The Clop ransomware gang has begun extorting companies whose data was stolen using a zero-day flaw in the Fortra GoAnywhere MFT secure file-sharing solution. The extortion group said they used the flaw over ten days to steal data from 130 companies.

 Malware and Vulnerabilities

Microsoft Threat Intelligence stumbled across an open source adversary-in-the-middle (AiTM) phishing kit that furthers the ability of hackers to launch organized attacks and also scale it. The threat actor behind the kit is being tracked under the moniker DEV-1101. The kit’s features include setting up landing pages   show more ...

impersonating Microsoft Office and Outlook platforms. It can let attackers manage campaigns from mobile devices and even bypass CAPTCHA barriers.

 Feed

This Metasploit module exploits a vulnerability in RedHat based systems where improper file permissions are applied to /usr/lib/tmpfiles.d/tomcat.conf for Apache Tomcat versions before 7.0.54-8. The configuration files in tmpfiles.d are used by systemd-tmpfiles to manage temporary files including their creation. With   show more ...

this weak permission, you are able to inject commands into the systemd-tmpfiles service to write a cron job to execute a payload. systemd-tmpfiles is executed by default on boot on RedHat-based systems through systemd-tmpfiles-setup.service. Depending on the system in use, the execution of systemd-tmpfiles could also be triggered by other services, cronjobs, startup scripts etc. This module was tested against Tomcat 7.0.54-3 on Fedora 21.

 Feed

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

 Feed

Red Hat Security Advisory 2023-1159-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.31.

 Feed

Ubuntu Security Notice 5949-1 - It was discovered that Chromium could be made to write out of bounds in several components. A remote attacker could possibly use this issue to corrupt memory via a crafted HTML page, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that Chromium   show more ...

contained an integer overflow in the PDF component. A remote attacker could possibly use this issue to corrupt memory via a crafted PDF file, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5948-1 - It was discovered that Werkzeug did not properly handle the parsing of nameless cookies. A remote attacker could possibly use this issue to shadow other cookies. It was discovered that Werkzeug could be made to process unlimited number of multipart form data parts. A remote attacker could possibly use this issue to cause Werkzeug to consume resources, leading to a denial of service.

 Feed

Red Hat Security Advisory 2023-1192-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Government entities and large organizations have been targeted by an unknown threat actor by exploiting a security flaw in Fortinet FortiOS software to result in data loss and OS and file corruption. "The complexity of the exploit suggests an advanced actor and that it is highly targeted at governmental or government-related targets," Fortinet researchers Guillaume Lovet and Alex Kong said in an

 Feed

An open source adversary-in-the-middle (AiTM) phishing kit has found a number of takers in the cybercrime world for its ability to orchestrate attacks at scale. Microsoft Threat Intelligence is tracking the threat actor behind the development of the kit under its emerging moniker DEV-1101. An AiTM phishing attack typically involves a threat actor attempting to steal and intercept a target's

 Feed

A new Golang-based malware dubbed GoBruteforcer has been found targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres to corral the devices into a botnet. "GoBruteforcer chose a Classless Inter-Domain Routing (CIDR) block for scanning the network during the attack, and it targeted all IP addresses within that CIDR range," Palo Alto Networks Unit 42 researchers said. "The threat actor

 Feed

Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit has stepped out from the shadows of the Conti ransomware group, who were disbanded in early 2022. LockBit ransomware was first discovered in September 2019 and was previously known as ABCD ransomware because of the ".abcd virus" extension first

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! Attacks targeting the software supply chain are on the rise and splashed across the news. SolarWinds raised awareness about the risk. More recent events, like the Federal Civilian Executive   show more ...

Branch (FCEB) agency breach, … Continue reading "Software supply chain attacks are on the rise — are you at risk?"

2023-03
Aggregator history
Tuesday, March 14
WED
THU
FRI
SAT
SUN
MON
TUE
MarchAprilMay